Insights

Network Security

Business happens across networks, but threats also come across networks: private and public; on-premises and cloud. Networks are often the last place you can find evidence of and stop attacks. These types of solutions need to understand a wide variety of traffic types to determine what is normal and not across varied customer environments. Network security tools that protect corporate data centers, remote workers, industrial facilities, and cloud assets are essential.

Webinar
Webinar
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Working from anywhere and the adoption of cloud services from multiple providers have become increasingly common in the post-pandemic era, but this has created new opportunities for cyber attackers...
Learn more
Blog
Blog
IT Security Transformation Can Come from Unexpected Places
The Covid-19 pandemic accelerated IT transformation in many ways. Lessons learned, among other things, is that IT software architecture must be highly flexible and scalable to handle the...
Learn more
Executive View
Executive View
Akana by Perforce
Akana API Platform is a fully integrated API management, transformation, and security platform that can address a multitude of enterprise use cases from API design and development to business...
Learn more
Webinar Recording
Webinar Recording
The Changing Scope of the NIS 2 EU Directive
The NIS Directive aimed at achieving a common standard of network and information security across all EU Member States, with a focus on operators of essential services, is scheduled for an update....
Learn more
KuppingerCole Analyst Chat: The Dark Side of the API Economy
Blog
KuppingerCole Analyst Chat: The Dark Side of the API Economy
Matthias Reinwarth and Alexei Balaganski discuss the challenges of explosive API growth without proper security controls in place.
Analyst Chat #9: The Dark Side of the API Economy
Analyst Chat
Analyst Chat #9: The Dark Side of the API Economy
Matthias Reinwarth and Alexei Balaganski discuss the challenges of explosive API growth without proper security controls in place.
Malicious Actors Exploiting Coronavirus Fears
Blog
Malicious Actors Exploiting Coronavirus Fears
Security researchers are discovering a number of malicious attacks designed to exploit public fears around COVID-19, more commonly just called coronavirus. The attacks to date take two major...
Compromise of IOTA
Blog
Compromise of IOTA
Turning a blind eye to security in favor of optimism If you have any take-away from reading KuppingerCole research , hopefully it is that APIs are a critical element to protect. This is true...
Ambient Intelligence Can’t Mature Without an Identity Protocol
Blog
Ambient Intelligence Can’t Mature Without an Identity Protocol
Every day we are experiencing the intersection of IoT and AI. The interactions of users, sensors, robots, vehicles, smart buildings, and much more is creating a new status quo for digital...
Moving Towards AI and IoT Solutions Beyond Machine Learning
Blog
Moving Towards AI and IoT Solutions Beyond Machine Learning
Microsoft is currently running ads extoling the virtue of AI and IoT sensors in helping farmers produce more and better crops, with less waste and higher yields. Elsewhere in manufacturing, supply...
API Management and Security: Don’t Trade Protection for Convenience
Webinar Recording
API Management and Security: Don’t Trade Protection for Convenience
Once a purely technical concept created to make developers’ lives easier, Application Programming Interfaces (APIs) have evolved into one of the foundations of modern digital business. As...
RPA and AI: Don’t Isolate Your Systems, Synchronize Them
Blog
RPA and AI: Don’t Isolate Your Systems, Synchronize Them
We already hear a lot about artificial intelligence (AI) systems being able to automate repetitive tasks. But AI is such a large term that encompasses many types of very different technologies....
API Platforms as the Secure Front Door to Your Identity Fabric
Blog
API Platforms as the Secure Front Door to Your Identity Fabric
Identity and Access Management (IAM) is on the cusp of a new era: that of the Identity Fabric. An Identity Fabric is a new logical infrastructure that acts as a platform to provide and orchestrate...
Palo Alto Networks Continues to Bet on Security-as-a-Service
Blog
Palo Alto Networks Continues to Bet on Security-as-a-Service
The market shift to cloud-based security services was highlighted at the Ignite Europe 2019 held by Palo Alto Networks in Barcelona, where the company announced a few product enhancements in an...
Previous
4 5 6 7 8 9 10 Next